under cover in anonymous dark web forums and discussion boards where cyber attacks are born. it s what criminals are talking about and what they are discussing and who they are planning to attack and how they are planning to do it. they said the anonymity allow them to strategize openly from how to hack into a car. this is the vp of ibm securities and said corporations need to share information to combat these attacks. that s not what happened. that s why the company launched this database. that keeps track of the attacks
stories of their heroic final moments. tori johnson on the right reportedly grabbed the gunman s weapon and reports that katrina dawson, the 38-year-old lawyer shielded her pregnant friend from the gunfire. that deadly lone wolf attack is the most likely attack to take place on u.s. soil in large part because they are extremely difficult to police and prevent. cnn s chief national security correspondent jim sciutto has more. reporter: lone wolf attacks consistently they are the most likely attacks to take place on u.s. soil, officials tell me. key word, lone, by definition, lone wolf attackers don t conspire with anyone else, they may not communicate with anyone else about their intentions. they can radicalize on their own very easily, watching sermons on the web, taking part in online chat rooms and there are many on jihadi web forums. they can plan on their own and find all the information they
for possible lone wolves to communicate with actual groups. offer themselves as potential terrorists. reporter: need proof? prosecutors say the men accused of the boston bombings used jihadi websites for inspiration and bomb building advice. security analysts say anwar al alawki exchanged e-mails with nadal hasan. and khalid shaikh mohammed is believed to have used a hotmail account. al qaeda started with one a decade ago. we have at least a dozen al qaeda web forums that host thousands of individuals. reporter: a few years back when the hunt for osama bin laden was still raging, some intelligence forces believed al qaeda was even developing its own intranet that was
communicate with actual groups. offer themselves as potential terrorists. reporter: need proof? prosecutors say the men accused of the boston bombings used jihadi websites for inspiration and bomb building advice. security analysts say anwar al alawki exchanged e-mails with nadal hasan. and khalid shaikh mohammed is believed to have used a hotmail account. al qaeda started with one a decade ago. we have at least a dozen al qaeda web forums that host thousands of individuals. reporter: a few years back when the hunt for osama bin laden was still raging, some intelligence forces believed al qaeda was even developing its own intranet that was electronically hidden behind jihadi websites and accessible to only a few people.
and bomb building advice. security analysts say anwar al alawki. and ka limb sheikh mohamed is believed to have used a hotmail account. al qaeda started with one a decade ago. we have at least a dozen al qaeda web forums that host thousands of individuals. reporter: a few years back when the hunt for osama bin laden was still raging, some intelligence forces believed al qaeda was even developing its own intranet that was electronically hidden behind jihadi websites and accessible to only a few people. whether they succeeded or such a system still exists like much of the communication structure remains shrouded in mystery. tom foreman, washington. of course the great irony using so much american innovation to try to destroy